{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:14:35Z","timestamp":1762341275886,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/ants.2018.8710078","type":"proceedings-article","created":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T22:12:15Z","timestamp":1557439935000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Blockchain based Security Framework for P2P Filesharing system"],"prefix":"10.1109","author":[{"given":"Srikanta","family":"Pradhan","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]},{"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/GLOCOM.2013.6831163"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3136825.3136865"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/3-540-45518-3_18"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/CNS.2014.6997509"},{"year":"2015","author":"tsehayu","journal-title":"Secure routing on structured p2p overlayssimulating secure routing on chord dht","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.2991\/lemcs-15.2015.260"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/s12083-013-0216-4"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICC.2013.6654819"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"4045","DOI":"10.17485\/ijst\/2013\/v6i2.11","article-title":"Intrusion detection system to detect ddos attack in gnutella hybrid p2p network","volume":"6","author":"uddin","year":"2013","journal-title":"Indian Journal of Science and Technology"},{"key":"ref19","article-title":"Getrust: A guarantee-based trust model in chord-based p2p networks","author":"meng","year":"2016","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/s12083-012-0137-7"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.21236\/ADA465464"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/844128.844156"},{"key":"ref5","first-page":"254","article-title":"Conducting routing table poisoning attack in dht networks","author":"lin","year":"2010","journal-title":"Communications Circuits and Systems (ICCCAS) 2010 International Conference On IEEE"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.procs.2014.05.541"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ISPA.2008.15"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICPP.2011.14"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/FGCT.2013.6767198"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/CyberSecurity.2012.8"},{"year":"2005","author":"rowaihy","journal-title":"Limiting sybil attacks in structured peer-to-peer networks","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/MCOM.2017.1700879"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/INFOCOM.2006.231"}],"event":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","start":{"date-parts":[[2018,12,16]]},"location":"Indore, India","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8703707\/8710036\/08710078.pdf?arnumber=8710078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,12]],"date-time":"2020-12-12T04:19:03Z","timestamp":1607746743000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8710078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ants.2018.8710078","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}